US8793680B2 - Apparatus and method for cooperatively updating firmware on wireless mesh network - Google Patents
Apparatus and method for cooperatively updating firmware on wireless mesh network Download PDFInfo
- Publication number
- US8793680B2 US8793680B2 US13/280,957 US201113280957A US8793680B2 US 8793680 B2 US8793680 B2 US 8793680B2 US 201113280957 A US201113280957 A US 201113280957A US 8793680 B2 US8793680 B2 US 8793680B2
- Authority
- US
- United States
- Prior art keywords
- update
- target node
- code
- code image
- neighboring nodes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
- G06F8/654—Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
- G06F9/45508—Runtime interpretation or emulation, e g. emulator loops, bytecode interpretation
- G06F9/45512—Command shells
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Definitions
- the present invention relates to a wireless mesh network, and more particularly, to an apparatus and method for cooperatively updating firmware running on nodes in a wireless mesh network, to thereby stably perform firmware update while reducing bandwidth through inter-node cooperation on the wireless mesh network.
- Wireless mesh network technology refers to a network technology that covers a wide area without any connection to a wired network by having access points in an existing wireless LAN equipped with network functions such as multi-hop routing and interconnecting these functions using a wireless communication technology.
- nodes are installed at places not easily reachable by people, or a large number of nodes are installed. Hence, it is difficult to collect the nodes once they are installed, making it difficult to maintain and repair software in the nodes.
- FOTA firmware over-the-air
- the method described above has a significant effect of bandwidth reduction because a new code can be generated by transmitting a part of the script if only a part of the existing code image is modified.
- the size of the new code image itself may be less than the size of the script.
- nodes autonomously configure the network, and data is transmitted in a multi-hop fashion.
- data is transmitted in a multi-hop fashion.
- it is necessary to transmit similar data multiple times in a multi-hop fashion, which causes bandwidth waste.
- FIG. 1 illustrates the concept of sequential network re-programming in a wireless mesh network according to the prior art.
- BS base station
- FIG. 1 illustrates the concept of sequential network re-programming in a wireless mesh network according to the prior art.
- raw images of the same data size are continuously transmitted for update from a base station (BS) 100 to the target node requiring update via intermediate nodes. This results in an increase in the bandwidth usage of the network to update images, leading to unnecessary waste of the bandwidth of the network.
- BS base station
- the present invention provides an apparatus and method for cooperatively updating firmware running on nodes in a wireless mesh network, to stably perform firmware update through inter-node cooperation by transmitting a differential script from a base station to a target node on the wireless mesh network.
- an apparatus for updating firmware running on nodes in a wireless mesh network there is provided an apparatus for updating firmware running on nodes in a wireless mesh network.
- the apparatus for updating firmware includes a code image database for storing a code image running on each node in the mesh network, and version of the code image.
- the apparatus for updating firmware also includes an update script generator.
- the update script generator for generates, if a code image running on a target node in the mesh network needs to be updated, a code update script with reference to the code images of the target node and its neighboring nodes stored in the code image database, and performs update of the target node using the code update script.
- the method for updating firmware includes checking whether a code image currently running on a target node in the mesh network needs to be updated.
- the method for updating firmware also includes generating a code update script with reference to the currently running code image of the target node and the respective code images running on its neighboring nodes when the code image of the target node needs to be updated.
- the method for updating firmware also includes performing update of the code image of the target node to a new code image using the code update script.
- FIG. 1 is a view illustrating a conventional firmware update method in a wireless mesh network transmitting raw code images from a base station to a target node;
- FIG. 2 shows the representation of code images running on nodes in a wireless mesh network
- FIG. 3 illustrates an apparatus for cooperatively updating firmware running on nodes a wireless mesh network in accordance with an embodiment of the present invention
- FIGS. 4 to 9 are views sequentially illustrating the process of cooperatively updating firmware running on a target node in accordance with the embodiment of the present invention.
- FIG. 10 illustrates the concept of sequential network reprogramming using cooperative firmware update in a wireless mesh network in accordance with the embodiment of the present invention.
- FIG. 2 illustrates the configuration of code images running on nodes in a wireless mesh network.
- Each node in the wireless mesh network may differ in their application programs to be executed.
- the modules such as kernel, network stack, application protocol, and the like, are commonly used by all nodes, and therefore the code image running on each node can have common binary of the corresponding modules.
- Such a factor may enable an efficient update in updating the commonly used modules excepting the application programs, through the utilization of neighboring nodes.
- FIG. 3 illustrates an apparatus for cooperatively updating firmware running on nodes in a wireless mesh network by employing the above concept in accordance with an embodiment of the present invention.
- a wireless firmware update apparatus of the present invention includes a plurality of nodes 310 constituting the wireless mesh network, a code image DB 302 for managing the code images currently running on the nodes 310 , and an update script generator 304 .
- the update script generator 304 generates a code update script 305 with reference to the code images currently running on a target node and its neighboring nodes, information of which are stored in the code image DB 302 , when it is desired to change the running code of the target node.
- the code image DB 302 stores the running code image of each node and the version number of that image. Accordingly, if the running code image of a certain node has been changed, data of the changed code image in the code image DB 302 also needs to be updated. The reason why running code images are stored and managed is to use them for a differential script to be generated when the code images are updated. Each node separately stores the version of the currently running code in order to manage the version of a code image to be run.
- FIG. 4 illustrates a procedure for performing update of a target node, especially, a procedure for requesting update, in the wireless firmware update apparatus in accordance with the present invention.
- an update requesting message is generated with reference to the version of the target node 400 stored in the code image DB 302 , wherein the update requesting message contains the referenced version of the currently running code of the target node 400 and the version of a new code one step higher than the currently running code.
- the update requesting message is then transmitted to the target node 400 via intermediate nodes 402 in step S 10 .
- step S 12 Upon receiving the update requesting message, in step S 12 , if the referenced version of the running code contained in the update requesting message is higher than that of currently running code in the target node 400 , the target node 400 multicasts an update cooperation requesting message to the neighboring nodes 402 . Thereafter, the target node 400 collects update cooperation response messages to the update cooperation requesting message from the neighboring nodes 402 for a predetermined time period.
- Such an update cooperation requesting message is relayed by the neighboring nodes 400 to the neighboring nodes 402 within the multicast radius of one or more hops.
- the network bandwidth can be reduced only when the multicast radius is shorter than the distance between the base station 306 and the target node 400 .
- FIG. 5 illustrates a procedure for performing cooperative update of the target node 400 , especially, a procedure for responding to the update requesting, in the firmware update apparatus in accordance with the embodiment of the present invention.
- step S 14 upon receiving the update cooperation requesting message, the neighboring nodes 402 notify the target node 400 of an update cooperation answering message representing whether or not cooperation is possible. For example, if cooperation is impossible owing to shortage of power supply or the like, the neighboring nodes 402 may refuse to cooperate.
- step S 16 based on the update cooperation answering messages collected from the neighboring nodes 402 , the target node 400 generates a collective update answering message indicating the participation or nonparticipation of the neighboring nodes 402 and transmits the collective update answering message to the base station 306 .
- step S 18 the base station 306 provides the collective update answering message to the update script generator 304 , and the update script generator 304 then generates a code update script using information about the participation or nonparticipation contained in the collective update answering message.
- the update scrip generator 304 generates the code update script by which the use of the least network bandwidth is allowed by using the code images of the target node 400 and its neighboring nodes 402 stored in the code image DB 302 .
- the update script generator 304 generates respective differential scripts between the current code image of the target node 400 and the respective code images of the neighboring nodes 402 , and generates a code update script using as little network bandwidth as possible by taking into consideration the differential scripts and the distance to the referenced neighboring nodes 402 .
- FIG. 6 illustrates a procedure for transmitting the code update script and inquiring the neighboring nodes of a code fragment in accordance with the embodiment of the present invention.
- step S 20 the code update script 305 generated in the procedures of FIGS. 4 and 5 is transmitted to the target node 400 on an update scrip message.
- the target node 400 Upon receiving the update scrip message, the target node 400 then generates a new code image by executing the code update script 305 line by line.
- a code inquiring message is transmitted to the neighboring nodes 402 in step S 22 .
- the neighboring nodes 402 put a corresponding code fragment to the inquiry into a code inquiry answering message and provide it to the target node 400 in step S 24 .
- FIG. 7 illustrates a procedure for creating a new code image after the code image update in accordance with the embodiment of the present invention.
- step S 26 the target node 400 completes the new code image using the code fragment provided from the neighboring nodes 402 , and creates a digest by encrypting the completed code image to a hash function. And then, in step S 28 , the target node 400 transmits a creation confirmation message containing the digest to the base station 306 .
- the base station 306 verifies the integrity of the created code image by comparing the digest transmitted from the target node 400 with the digest of the raw code image created by the base station 306 .
- FIG. 8 illustrates a procedure for performing firmware update after verifying the integrity of the code image in accordance with the embodiment of the present invention
- FIG. 9 illustrates a procedure for reporting an update completion and updating the content of the code image DB in accordance with the embodiment of the present invention.
- the update script generator 304 transmits an update execution requesting message to the target node 400 in step S 30 , and the target node 400 executes firmware update accordingly in step S 32 . Subsequently, as shown in FIG. 9 , the target node 400 transmits an update confirmation message to the update script generator 304 via the base station 306 after completion of the update in step S 34 , and the update script generator 304 updates the code image DB 302 with the new running code image of the target node 400 in step S 36 .
- FIG. 10 illustrates the concept of sequential network reprogramming using cooperative firmware update in a wireless mesh network in accordance with the embodiment of the present invention.
- a differential script is generated with reference to the code images of the nodes around the target node, as well as the past code images of the target node, and therefore it is possible to make a much smaller script than an existing differential script.
- the present invention can perform firmware update through inter-node cooperation by allowing each node in the wireless mesh network to transmit a differential script, instead of the raw image, from the base station to the target node, using commonly used binary information, such as kernel, network stack, application protocol, and the like. Therefore, bandwidth can be reduced, and firmware update and maintenance management can be done more stably.
Abstract
Description
Claims (15)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2010-0103929 | 2010-10-25 | ||
KR1020100103929A KR101383691B1 (en) | 2010-10-25 | 2010-10-25 | Apparatus and method for cooperatively updating firmware on wireless mesh network |
Publications (2)
Publication Number | Publication Date |
---|---|
US20120102478A1 US20120102478A1 (en) | 2012-04-26 |
US8793680B2 true US8793680B2 (en) | 2014-07-29 |
Family
ID=43405860
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/280,957 Expired - Fee Related US8793680B2 (en) | 2010-10-25 | 2011-10-25 | Apparatus and method for cooperatively updating firmware on wireless mesh network |
Country Status (2)
Country | Link |
---|---|
US (1) | US8793680B2 (en) |
KR (1) | KR101383691B1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140075425A1 (en) * | 2012-09-13 | 2014-03-13 | Elememtal Technologies, Inc. | Handshaking methodology and redundant data channel between servers during software upgrade |
US9665469B2 (en) * | 2015-07-24 | 2017-05-30 | American Megatrends, Inc. | System and method of runtime downloading of debug code and diagnostics tools in an already deployed baseboard management controller (BMC) devices |
US11747375B2 (en) | 2017-07-20 | 2023-09-05 | Targus International Llc | Systems, methods and devices for remote power management and discovery |
US11818504B2 (en) | 2019-08-22 | 2023-11-14 | Targus International Llc | Systems and methods for participant-controlled video conferencing |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100951622B1 (en) * | 2008-05-02 | 2010-04-09 | 강릉원주대학교산학협력단 | Method for updating firmware of sensor nodes on a wireless sensor network and firmware updater using for the same method |
US8997085B2 (en) * | 2011-06-24 | 2015-03-31 | International Business Machines Corporation | Image delta-based upgrade of complex stack in software appliance |
US9081643B2 (en) * | 2012-09-21 | 2015-07-14 | Silver Sring Networks, Inc. | System and method for efficiently updating firmware for nodes in a mesh network |
WO2014158194A1 (en) * | 2013-03-29 | 2014-10-02 | Hewlett-Packard Development Company, L.P. | Update of programmable for computing nodes |
KR101495749B1 (en) * | 2013-05-02 | 2015-02-25 | (주)누리텔레콤 | Method for upgrading of nodes in remote meter reading system and apparatus thereof |
EP3040858A1 (en) * | 2014-12-31 | 2016-07-06 | Echelon Corporation | A method and system of processing an image update |
US10101987B2 (en) | 2015-03-11 | 2018-10-16 | Echelon Corporation | Method and system of processing an image upgrade |
US9763062B2 (en) * | 2015-04-01 | 2017-09-12 | Synapse Wireless, Inc. | Rapid deployment of software updates in multi-hop wireless networks |
US10303456B2 (en) * | 2017-03-23 | 2019-05-28 | Intel Corporation | Technologies for performing energy efficient software distribution |
JP6536618B2 (en) * | 2017-04-20 | 2019-07-03 | 富士通株式会社 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND CONTROL PROGRAM |
KR102034427B1 (en) * | 2018-02-21 | 2019-10-18 | 주식회사 펀진 | IoT Device and It's Firmware Update Method |
CN109002318A (en) * | 2018-07-25 | 2018-12-14 | 郑州云海信息技术有限公司 | A kind of firmware update of CPLD, device, equipment and medium |
US11012853B2 (en) | 2018-11-20 | 2021-05-18 | Parallel Wireless, Inc. | Secure software update in a wireless mesh radio network using peer-to-peer file sharing |
Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6836483B1 (en) * | 1998-06-24 | 2004-12-28 | Research Investment Network, Inc. | Message system for asynchronous transfer |
US7073172B2 (en) * | 1998-09-21 | 2006-07-04 | Microsoft Corporation | On demand patching of applications via software implementation installer mechanism |
US7246351B2 (en) * | 2001-02-20 | 2007-07-17 | Jargon Software | System and method for deploying and implementing software applications over a distributed network |
KR20090062317A (en) | 2007-12-12 | 2009-06-17 | 한국전자통신연구원 | Method and system for upgrading in multi hop wireless network |
US7634772B2 (en) * | 1996-12-12 | 2009-12-15 | Microsoft Corporation | Automatic software downloading from a computer network |
US7694291B2 (en) * | 2004-04-06 | 2010-04-06 | Hewlett-Packard Development Company, L.P. | Build optimizer tool for efficient management of software builds for mobile devices |
US20100095293A1 (en) | 2000-11-17 | 2010-04-15 | O'neill Patrick | Network for updating firmware and / or software in wireless communication devices |
KR20100063869A (en) | 2008-12-04 | 2010-06-14 | 포항공과대학교 산학협력단 | Method and apparatus for sensor node software update in wireless sensor network |
US7739679B2 (en) * | 2004-04-06 | 2010-06-15 | Hewlett-Packard Development Company, L.P. | Object ordering tool for facilitating generation of firmware update friendly binary image |
US7814474B2 (en) * | 2000-11-17 | 2010-10-12 | Hewlett-Packard Development Company, L.P. | Updatable mobile handset based on Linux with compression and decompression techniques |
US7870548B2 (en) * | 2007-01-05 | 2011-01-11 | Inventec Corporation | Method for updating an image file |
US7958502B2 (en) * | 2005-08-05 | 2011-06-07 | Hewlett-Packard Development Company, L.P. | Efficient generator of update packages for mobile devices that uses non-ELF preprocessing |
US7996829B2 (en) * | 2006-07-31 | 2011-08-09 | Hewlett-Packard Development Company, L.P. | Managing software revisions for servers in an infrastructure |
US8233893B2 (en) * | 2002-08-22 | 2012-07-31 | Hewlett-Packard Development Company, L.P. | Mobile handset update package generator that employs nodes technique |
US8255894B2 (en) * | 2006-07-31 | 2012-08-28 | Seiko Epson Corporation | Update data transmission method, computer program for practicing the method, host device and firmware writing system |
US8261256B1 (en) * | 2006-08-24 | 2012-09-04 | Bby Solutions, Inc. | System and method for automatically updating the software of a networked personal audiovisual device |
US8316361B2 (en) * | 2003-01-09 | 2012-11-20 | Hewlett-Packard Development Company, L.P. | Method of enabling a user to update one or more low-level resources of a computer system in a user-friendly manner |
US8375381B1 (en) * | 2007-07-30 | 2013-02-12 | Adobe Systems Incorporated | Management user interface for application execution environment |
US8418168B2 (en) * | 2008-05-29 | 2013-04-09 | Research In Motion Limited | Method and system for performing a software upgrade on an electronic device connected to a computer |
US8429640B2 (en) * | 2009-06-05 | 2013-04-23 | Dell Products L.P. | System and method for modifying firmware |
US8448161B2 (en) * | 2007-07-30 | 2013-05-21 | Adobe Systems Incorporated | Application tracking for application execution environment |
US8464249B1 (en) * | 2009-09-17 | 2013-06-11 | Adobe Systems Incorporated | Software installation package with digital signatures |
US8510729B2 (en) * | 2009-05-21 | 2013-08-13 | Salesforce.Com, Inc. | System, method and computer program product for versioning and deprecation of components of an application |
US8516475B2 (en) * | 2002-09-13 | 2013-08-20 | Ricoh Company, Ltd. | Image forming apparatus and methods used in the image forming apparatus |
US8612516B2 (en) * | 2011-11-28 | 2013-12-17 | Wyse Technology Inc. | Deployment of a driver or an application on a client device having a write-filter |
-
2010
- 2010-10-25 KR KR1020100103929A patent/KR101383691B1/en active IP Right Grant
-
2011
- 2011-10-25 US US13/280,957 patent/US8793680B2/en not_active Expired - Fee Related
Patent Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7634772B2 (en) * | 1996-12-12 | 2009-12-15 | Microsoft Corporation | Automatic software downloading from a computer network |
US6836483B1 (en) * | 1998-06-24 | 2004-12-28 | Research Investment Network, Inc. | Message system for asynchronous transfer |
US7073172B2 (en) * | 1998-09-21 | 2006-07-04 | Microsoft Corporation | On demand patching of applications via software implementation installer mechanism |
US20100095293A1 (en) | 2000-11-17 | 2010-04-15 | O'neill Patrick | Network for updating firmware and / or software in wireless communication devices |
US7814474B2 (en) * | 2000-11-17 | 2010-10-12 | Hewlett-Packard Development Company, L.P. | Updatable mobile handset based on Linux with compression and decompression techniques |
US7246351B2 (en) * | 2001-02-20 | 2007-07-17 | Jargon Software | System and method for deploying and implementing software applications over a distributed network |
US8233893B2 (en) * | 2002-08-22 | 2012-07-31 | Hewlett-Packard Development Company, L.P. | Mobile handset update package generator that employs nodes technique |
US8516475B2 (en) * | 2002-09-13 | 2013-08-20 | Ricoh Company, Ltd. | Image forming apparatus and methods used in the image forming apparatus |
US8316361B2 (en) * | 2003-01-09 | 2012-11-20 | Hewlett-Packard Development Company, L.P. | Method of enabling a user to update one or more low-level resources of a computer system in a user-friendly manner |
US7694291B2 (en) * | 2004-04-06 | 2010-04-06 | Hewlett-Packard Development Company, L.P. | Build optimizer tool for efficient management of software builds for mobile devices |
US7739679B2 (en) * | 2004-04-06 | 2010-06-15 | Hewlett-Packard Development Company, L.P. | Object ordering tool for facilitating generation of firmware update friendly binary image |
US7958502B2 (en) * | 2005-08-05 | 2011-06-07 | Hewlett-Packard Development Company, L.P. | Efficient generator of update packages for mobile devices that uses non-ELF preprocessing |
US7996829B2 (en) * | 2006-07-31 | 2011-08-09 | Hewlett-Packard Development Company, L.P. | Managing software revisions for servers in an infrastructure |
US8255894B2 (en) * | 2006-07-31 | 2012-08-28 | Seiko Epson Corporation | Update data transmission method, computer program for practicing the method, host device and firmware writing system |
US8261256B1 (en) * | 2006-08-24 | 2012-09-04 | Bby Solutions, Inc. | System and method for automatically updating the software of a networked personal audiovisual device |
US7870548B2 (en) * | 2007-01-05 | 2011-01-11 | Inventec Corporation | Method for updating an image file |
US8375381B1 (en) * | 2007-07-30 | 2013-02-12 | Adobe Systems Incorporated | Management user interface for application execution environment |
US8448161B2 (en) * | 2007-07-30 | 2013-05-21 | Adobe Systems Incorporated | Application tracking for application execution environment |
KR20090062317A (en) | 2007-12-12 | 2009-06-17 | 한국전자통신연구원 | Method and system for upgrading in multi hop wireless network |
US8418168B2 (en) * | 2008-05-29 | 2013-04-09 | Research In Motion Limited | Method and system for performing a software upgrade on an electronic device connected to a computer |
KR20100063869A (en) | 2008-12-04 | 2010-06-14 | 포항공과대학교 산학협력단 | Method and apparatus for sensor node software update in wireless sensor network |
US8510729B2 (en) * | 2009-05-21 | 2013-08-13 | Salesforce.Com, Inc. | System, method and computer program product for versioning and deprecation of components of an application |
US8429640B2 (en) * | 2009-06-05 | 2013-04-23 | Dell Products L.P. | System and method for modifying firmware |
US8464249B1 (en) * | 2009-09-17 | 2013-06-11 | Adobe Systems Incorporated | Software installation package with digital signatures |
US8612516B2 (en) * | 2011-11-28 | 2013-12-17 | Wyse Technology Inc. | Deployment of a driver or an application on a client device having a write-filter |
Non-Patent Citations (6)
Title |
---|
Cai et al, "Experiences Integrating and Scaling a Performance Test Bed Generator with an Open Source CASE Tool", IEEE, pp. 1-10, 2004. * |
El-Kwae et al, "Efficient Content-Based Indexing of Large Image Databases", ACM Transactions on Information Systems, vol. 18, No. 2, pp. 171-210, 2000. * |
Fu et al, "Node Splitting Algorithms in Tree-Structured High-Dimensional Indexes for Similarity Search", ACM, pp. 766-770, 2002. * |
Hui, Jonathan W. et al., "The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale," Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys '04 (2004(. |
Reijers, Niels et al., "Efficient Code Distribution in Wireless Sensor Networks," Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications, WSNA '03 (2003). |
Shyu et al, "A Unified Framework for Image Database Clustering and Content-based Retrieval", ACM, pp. 19-27, 2004. * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140075425A1 (en) * | 2012-09-13 | 2014-03-13 | Elememtal Technologies, Inc. | Handshaking methodology and redundant data channel between servers during software upgrade |
US8972972B2 (en) * | 2012-09-13 | 2015-03-03 | Elemental Technologies, Inc. | Handshaking methodology and redundant data channel between servers during software upgrade |
US9665469B2 (en) * | 2015-07-24 | 2017-05-30 | American Megatrends, Inc. | System and method of runtime downloading of debug code and diagnostics tools in an already deployed baseboard management controller (BMC) devices |
US11747375B2 (en) | 2017-07-20 | 2023-09-05 | Targus International Llc | Systems, methods and devices for remote power management and discovery |
US11818504B2 (en) | 2019-08-22 | 2023-11-14 | Targus International Llc | Systems and methods for participant-controlled video conferencing |
Also Published As
Publication number | Publication date |
---|---|
KR101383691B1 (en) | 2014-04-09 |
US20120102478A1 (en) | 2012-04-26 |
KR20100120110A (en) | 2010-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8793680B2 (en) | Apparatus and method for cooperatively updating firmware on wireless mesh network | |
US20140123123A1 (en) | Distribution of software updates in wireless multihop networks | |
Mottola et al. | Logical neighborhoods: A programming abstraction for wireless sensor networks | |
Panta et al. | Stream: Low overhead wireless reprogramming for sensor networks | |
US9754096B2 (en) | Update management | |
Gandhi et al. | Minimizing broadcast latency and redundancy in ad hoc networks | |
CN102158983B (en) | Method for constructing 6LoWPAN wireless sensor network | |
CN100385855C (en) | System and its method for central remote automatic upgrading software | |
US11038767B2 (en) | Discovery of a set of nodes in a network | |
CN102224751A (en) | System and method for dynamic automatic communication path selection, distributed device synchronization and task delegation | |
CN107926074A (en) | M2M clustering managements | |
US20180034699A1 (en) | Network coordination apparatus | |
US20090190496A1 (en) | Method of Organizing Nodes of a Network into Groupings of Nodes, Computer Program for Implementing such a Method and Communication Device Forming a Node of a Network of Nodes | |
Li et al. | Distributed dataset synchronization in disruptive networks | |
US20140120837A1 (en) | Wifi direct setup using out of band signaling | |
Hossain et al. | IoTbed: A Generic Architecture for Testbed as a Service for Internet of Things-Based Systems. | |
CN103532922A (en) | Software version upgrade method, device and system | |
CN107181618A (en) | Firmware upgrade method and system | |
Shu et al. | Mobile edge aided data dissemination for wireless healthcare systems | |
JP5875696B2 (en) | Data distribution system, distribution device, terminal device, and data distribution method | |
Parodi et al. | An automatic procedure for neighbor cell list definition in cellular networks | |
CN102158966B (en) | Centralized time slot dispatching method and system | |
CN103686675A (en) | Method and device for adjacent region configuration | |
KR100953866B1 (en) | Mobility Agent apparatus in Sensor Network for Various Mobility Application Services | |
Pule et al. | Firmware updates over the air mechanisms for low power wide area networks: A review |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTIT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:JEONG, JONGSOO;REEL/FRAME:027117/0401 Effective date: 20110908 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551) Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20220729 |